establishingsecurity / trustzone-rootkit
TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.
☆14Updated 2 years ago
Related projects: ⓘ
- ☆14Updated last year
- IDA (sort of) headless☆19Updated 7 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆32Updated 2 months ago
- ☆17Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated last year
- Python interface for Binexport, the Bindiff export format☆14Updated 2 months ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- CTF writeups☆9Updated 4 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆20Updated last year
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 4 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- ☆33Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 3 years ago
- prebuild angr wheels for Windows on x86_64☆13Updated 6 years ago
- Investigating the bug behind CVE-2021-26708☆26Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆19Updated 5 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆22Updated 7 months ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- A tool to perform so called BGE attack☆20Updated 5 months ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- Export a binary from ghidra to emulate with unicorn☆25Updated 4 years ago
- binary ninja related code☆24Updated last year
- QuickPatch: A patching tool☆12Updated 4 years ago
- Python based angr plug in for IDA Pro.☆33Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 4 years ago
- ☆35Updated 3 years ago
- ☆18Updated this week
- ☆15Updated 2 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year